Browse Definitions:
11,850 results for:

build tool

Definition | SearchSoftwareQuality

A build tool is a programming utility that automates a software build task, such as ensuring that the proper source code files are compiled and that ...

JAD (Joint Application Development)

Definition | SearchSoftwareQuality

JAD (Joint Application Development) is a methodology that involves the client or end user in the design and development of an application, through a ...


Definition | SearchSoftwareQuality

In computer technology, a bug is a coding error in a computer program.

requirements analysis (requirements engineering)

Definition | SearchSoftwareQuality

Requirements analysis, also called requirements engineering, is the process of determining user expectations for a new or modified product... (...


Definition | SearchSoftwareQuality

Authorization is the process of giving someone permission to do or have something.

access control list (ACL)

Definition | SearchSoftwareQuality

An access control list (ACL) is a table that tells a computer operating system which access rights each user has to a particular system object, such ...

3-tier application

Definition | SearchSoftwareQuality

A 3-tier application is an application program that is organized into three major parts, each of which is distributed to a different place or places ...

model-driven development (MDD)

Definition | SearchSoftwareQuality

Model-driven development (MDD) is a paradigm for writing and implementing computer programs quickly, effectively and at minimum cost.

shotgun debugging

Definition | SearchSoftwareQuality

Shotgun debugging is the debugging of a program, hardware, or system problem using the approach of trying several possible solutions at the same time...

development environment

Definition | SearchSoftwareQuality

In computer program and software product development, the development environment is the set of processes and programming tools used to create the ...



  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...


  • cloud ecosystem

    A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional ...

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.


  • federated identity management (FIM)

    Federated identity management (FIM) is an arrangement that can be made among multiple enterprises to let subscribers use the same...

  • cross-site scripting (XSS)

    Cross-site scripting (XSS) is a type of injection security attack in which an attacker injects data, such as a malicious script, ...

  • firewall

    In computing, a firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or...




  • bad block

    A bad block is an area of storage media that is no longer reliable for storing and retrieving data because it has been physically...

  • all-flash array (AFA)

    An all-flash array (AFA), also known as a solid-state storage disk system, is an external storage array that uses only flash ...

  • volume manager

    A volume manager is software within an operating system (OS) that controls capacity allocation for storage arrays.


  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.